EP2981043A1 - Method for managing portal device, and portal device and system - Google Patents

Method for managing portal device, and portal device and system Download PDF

Info

Publication number
EP2981043A1
EP2981043A1 EP13880563.5A EP13880563A EP2981043A1 EP 2981043 A1 EP2981043 A1 EP 2981043A1 EP 13880563 A EP13880563 A EP 13880563A EP 2981043 A1 EP2981043 A1 EP 2981043A1
Authority
EP
European Patent Office
Prior art keywords
portal
client
server
portal server
instance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP13880563.5A
Other languages
German (de)
French (fr)
Other versions
EP2981043B1 (en
EP2981043A4 (en
Inventor
Qiandeng LIANG
Shuyi Wang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of EP2981043A1 publication Critical patent/EP2981043A1/en
Publication of EP2981043A4 publication Critical patent/EP2981043A4/en
Application granted granted Critical
Publication of EP2981043B1 publication Critical patent/EP2981043B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/24Negotiation of communication capabilities

Definitions

  • the present disclosure relates to network communication techniques, and in particular to a portal device management method, a portal device and a portal system.
  • Web authentication techniques are widely used in scenarios such as a campus network where network access authorization is performed after users go online, and corresponding Web authentication techniques have the following problems:
  • the embodiments of the disclosure are intended to provide a portal device management method, a portal device and a portal system so that it is possible to achieve the aim of load balancing, the portal client and the portal server can upgrade smoothly, and each of the portal client and the pre-configured portal server can announce its information to its opposite end, thus resulting in convenient and secure operation and maintenance.
  • the step that an instance connection between a portal client and a pre-configured portal server is established through capability negotiation may include:
  • the method may further include:
  • the method may further include:
  • the method may further include:
  • the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include:
  • the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include:
  • the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include:
  • An embodiment of the disclosure further provides a portal client including a first negotiation and connection module and a first announcement module, wherein
  • the first negotiation and connection module may be further configured to establish the instance connection with the pre-configured portal server when determining through capability negotiation with the pre-configured portal server that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  • the portal client may further include:
  • the first negotiation and connection module may be further configured to disconnect the instance connection with the pre-configured portal server when the portal client upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server when determining through capability negotiation with the pre-configured portal server that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  • the first negotiation and connection module may be further configured to update the instance connection with the pre-configured portal server according to load information announced by the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  • the first announcement module may be configured to announce an IP address of the portal client and an IP address pool locally configured at the portal client to the pre-configured portal server having the instance connection established with the first negotiation and connection module, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  • An embodiment of the disclosure further provides a portal server including a second negotiation and connection module and a second announcement module, wherein
  • the second negotiation and connection module may be further configured to establish the instance connection with the portal client when determining through capability negotiation with the portal client that a portal protocol version and function required by the portal client match a portal version and function supported by the portal server.
  • the second negotiation and connection module may be further configured to disconnect the instance connection with the portal client when the portal server upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client when determining through capability negotiation with the portal client that a portal protocol version and function required by the portal client match a portal version and function supported by the portal server after the upgrading.
  • the second announcement module may be configured to announce load information of the portal server to the portal client having the instance connection established with the portal server.
  • the second announcement module may be further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server to the portal client having the instance connection established with the portal server, and when the URL of the authentication page changes, announce the changed URL to the portal client having the instance connection established with the portal server.
  • URL Uniform Resource Locator
  • the second announcement module may be further configured to announce a public key of an asymmetric encryption algorithm to the portal client having the instance connection established with the portal server.
  • An embodiment of the disclosure further provides a portal system including a pre-configured portal client and a portal server, wherein
  • the portal client may include a first negotiation and connection module, a first announcement module and a determination module; and the pre-configured portal server may include a second negotiation and connection module and a second announcement module; and respective modules have same functions as those of the modules described above.
  • the portal client and portal server establish an instance connection therebetween through capability negotiation, and when the portal client or the portal server performs upgrading, the portal client or portal server can perform single-side smooth upgrading through disconnection of the instance connection without disruption of an authentication processing operation of the portal server or portal client that doesn't performs the upgrading, thus it is possible to solve a problem of tedious operation and maintenance resulted from the fact in the prior art that a portal client and a portal server matching the portal client must upgrade synchronously;
  • Fig. 1 is a flow chart of a portal device management method according to an embodiment of the disclosure, as shown in Fig. 1 , the method includes:
  • the portal client and the portal server are devices that perform network access authentication of a user client, and the network access authentication of the user client can be done through cooperation of the portal server and a portal client supporting the user client.
  • the step that an instance connection between a portal client and a pre-configured portal server is established through capability negotiation may include: the instance connection between the portal client and the pre-configured portal server is established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  • the pre-configured portal server having the instance connection established with the portal client is determined as a portal server that performs mandatory authentication of a user client supported by the portal client.
  • a processing process of network access authentication of the user client performed by the portal client and the determined portal server performing the mandatory authentication complies with portal protocol specifications.
  • the instance connection between the portal client and the pre-configured portal server is established through capability negotiation
  • the instance connection between the portal client and the pre-configured portal server is disconnected when the portal client upgrades its portal protocol
  • the instance connection between the portal client and the pre-configured portal server is re-established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  • the portal client and the portal server have their portal protocol versions and functions matching each other before the upgrading may not match each other any more after the upgrading, in order to avoid configuring a portal server not matching the portal client to perform mandatory authentication of the portal client, it is required to disconnect firstly the instance connection between the portal server and the portal client and then re-establish the instance connection after determination of matching.
  • the instance connection between the portal client and the pre-configured portal server is established through capability negotiation
  • the instance connection between the portal client and the pre-configured portal server is disconnected when the pre-configured portal server having the instance connection established with the portal client upgrades its portal protocol and/or function
  • the instance connection between the portal client and the pre-configured portal server is re-established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server after the upgrading.
  • Step 102 each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end.
  • the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include: the pre-configured portal server announces its load information to the portal client having the instance connection established with the pre-configured portal server; and the method may further include: the portal client updates the instance connection between the portal client and the pre-configured portal server according to the load information.
  • the portal client determines according to load information that a current load of the client server exceeds a preset threshold, the instance connection with the portal server is disconnected temporarily; if subsequently the portal client determines according to the load information announced by the portal server that a current load of the client server doesn't exceed the preset threshold, the temporarily-disconnected instance connection is recovered.
  • the load information of the portal server may include a description of the number of authentication requests from user clients currently processed by the portal server, and may also include a description of hardware load of the portal server, where the hardware load includes but is not limited to utilization rate of CPU, utilization rate of memory and utilization rate of network bandwidth.
  • the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include: the portal client announces, to the pre-configured portal server having the instance connection with the portal client, an IP address of the portal client or an IP address pool locally configured at the portal client, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client changes, the portal client announces the changed IP address and/or changed IP address pool to the pre-configured portal server having the instance connection with the portal client; and the pre-configured portal server announces a URL of its authentication page to the portal client having the instance connection established with the pre-configured portal server, and when the URL of the authentication page changes, announces the changed URL to the portal client having the instance connection established with the pre-configured portal server.
  • the portal client needs to announce a URL of an authentication page of the portal server to the user client so as to re-direct the user client to the authentication page of the portal server; the portal server needs to determine, through an IP address of the portal client and information of an IP address pool of the user client which is locally configured at the portal client, an IP address of a portal client supporting the user client, and announces authentication information of the user client acquired through the authentication page to the portal client supporting the user client so that the authentication information of the user client can be verified by the portal client supporting the user client.
  • the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include: the pre-configured portal server announces a public key of an asymmetric encryption algorithm to the portal client.
  • each of the portal client and portal server having the instance connection established therebetween can announces, to its opposite end, other information required during subsequent mandatory authentication of a user client, for example, a type of a protocol required during the authentication can be announced between the portal client and the portal server.
  • Fig, 2 is a schematic structural diagram of a portal system according to an embodiment of the disclosure, as shown in Fig. 2 , the system includes a portal client 21 and a pre-configured portal server 22, the portal client 21 is configured to establish an instance connection with the pre-configured portal server 22 through capability negotiation, and announce its information to the pre-configured portal server 22 having the instance connection established with the portal client 21; and the pre-configured portal server 22 is configured to establish the instance connection with the portal client 21 through capability negotiation, and announce its information to the portal client 21 having the instance connection established with the pre-configured portal server 22.
  • the portal client 21 is further configured to establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the pre-configured portal server 22.
  • the portal client 21 is further configured to determine the pre-configured portal server 22 having the instance connection established with the portal client 21 as a portal server 22 that performs mandatory authentication of a user client supported by the portal client 21.
  • the portal client 21 is further configured to disconnect the instance connection with the pre-configured portal server 22 when the portal client 21 upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 after the upgrading match a portal version and function supported by the pre-configured portal server 22.
  • the portal client 21 is further configured to update the instance connection with the pre-configured portal server 22 according to load information announced by the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 221.
  • the portal client 21 is further configured to announce an IP address of the portal client 21 and an IP address pool locally configured at the portal client to the pre-configured portal server 22 having the instance connection established with the portal client 21, and when the IP address of the portal client 21 and/or the IP address pool locally configured at the portal client change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server 22 having the instance connection established with the portal client 21.
  • the pre-configured portal server 22 is further configured to establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22.
  • the pre-configured portal server is further configured to disconnect the instance connection with the portal client 21 when the portal server 22 upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22 after the upgrading.
  • the pre-configured portal server 22 is further configured to announce its load information to the portal client 21 having the instance connection established with the portal server 22.
  • the pre-configured portal server 22 is further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server 22 to the portal client 21 having the instance connection established with the portal server 22, and when the URL of the authentication page changes, announce the changed URL to the portal client 21 having the instance connection established with the portal server 22.
  • URL Uniform Resource Locator
  • the pre-configured portal server is further configured to announce a public key of an asymmetric encryption algorithm to the portal client 21 having the instance connection established with the pre-configured portal server 22.
  • the portal client 21 includes a first negotiation and connection module 211 and a first announcement module 212, the first negotiation and connection module 211 is configured to establish an instance connection with a pre-configured portal server 22 through capability negotiation; and the first announcement module 212 is configured to announce information of the portal client 21 to the pre-configured portal server having the instance connection established with the first negotiation and connection module 211.
  • the first negotiation and connection module 211 is further configured to establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the pre-configured portal server 22.
  • the portal client 21 further include a determination module 213 configured to determine the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211 as a portal server 22 that performs mandatory authentication of a user client supported by the portal client 21.
  • the first negotiation and connection module 211 is further configured to disconnect the instance connection with the pre-configured portal server 22 when the portal client 21 upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 after the upgrading match a portal version and function supported by the pre-configured portal server 22.
  • the first negotiation and connection module 211 is further configured to update the instance connection with the pre-configured portal server 22 according to load information announced by the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211.
  • the first announcement module 212 is further configured to announce an IP address of the portal client 21 and an IP address pool locally configured at the portal client 21 to the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211, and when the IP address of the portal client 21 and/or the IP address pool locally configured at the portal client 21 change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211.
  • the first negotiation and connection module 211, the first announcement module 212 and the determination module 213 can all be implemented by a Central Processing Unit (CPU), a Digital Signal Processor (DSP) or a Field-Programmable Gate Array (FPGA) in the portal client 21.
  • CPU Central Processing Unit
  • DSP Digital Signal Processor
  • FPGA Field-Programmable Gate Array
  • the portal server 22 includes a second negotiation and connection module 221 and a second announcement module 222, the second negotiation and connection module 221 is configured to establish an instance connection with a portal client 21 through capability negotiation; and the second announcement module 222 is configured to announce information of the portal server 22 to the portal client 21 having the instance connection established with the second negotiation and connection module 221.
  • the second negotiation and connection module 221 is further configured to establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22.
  • the second negotiation and connection module 221 is further configured to disconnect the instance connection with the portal client 21 when the portal server 22 upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22 after the upgrading.
  • the second announcement module 222 is configured to announce load information of the portal server 22 to the portal client 21 having the instance connection established with the portal server 22.
  • the second announcement module 222 is further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server 22 to the portal client 21 having the instance connection established with the portal server 22, and when the URL of the authentication page changes, announce the changed URL to the portal client 21 having the instance connection established with the portal server 22.
  • URL Uniform Resource Locator
  • the second announcement module 222 is further configured to announce a public key of an asymmetric encryption algorithm to the portal client 21 having the instance connection established with the portal server 22.
  • the second negotiation and connection module 221 and the second announcement module 222 can both be implemented by a CPU, DSP or FPGA in the portal server 22.
  • a type of interactive message (the message type value is from 0x1 to 0x10) between a portal client and a portal server defined by existing portal protocols cannot meet requirements from interaction between the portal client and the portal server according to embodiments of the disclosure, it is required to extend the type of message defined by the existing portal protocols. For example, it can be extended to types of messages as follows.
  • the portal client when requesting to join the portal server, the portal client transmits a REQ_JOIN message to the portal server, wherein the REQ_JOIN message carries a c and function required by the portal client, and after receiving the message, the portal server determines whether a portal protocol version and function supported by the portal server match the portal protocol version and function required by the portal client (hereinafter the matching of the portal protocol version and function supported by the portal server and the portal protocol and function required by the portal client is referred simply as the matching of the portal server and the portal client); the REQ_JOIN message includes a capability parameter field with variable field length configured to carry information regarding the portal protocol version and function required by the portal client, and the capability parameter field is organized according to a Type length Value (TLV) format;
  • TLV Type length Value
  • the portal server after receiving the REQ_JOIN message and determining a matching result, the portal server carries the matching result in an ACK_JOIN message and transmits the ACK_JOIN message to the portal client, if an ErrCode field of the ACK_JOIN message is 0, it indicates that the portal server matches the portal client requesting to join therein, and if the ErrCode field of the ACK_JOIN message is 1, it indicates that the portal server doesn't match the portal client requesting to join therein; the ACK_JOIN message may further include an authentication method (Authen-Method) field with its length being 1 bit, for example, a value of the field being 0, 1 or 2 indicates that protocols used during authentication performed by the portal server and the portal client are respectively a Challenge Handshake Authentication Protocol (CHAP), a Password Authentication Protocol (PAP) or an Extensible Authentication Protocol (EAP);
  • CHAP Challenge Handshake Authentication Protocol
  • PAP Password Authentication Protocol
  • EAP Extensible Authentic
  • REQ_CONFIG message with its value being 0x13 when the portal client receives the ACK_JOIN message, if an ErrCode field of the message is 0, a REQ_CONFIG message is transmitted to the portal server transmitting the ACK_JOIN message to request for a URL of an authentication page of the portal server;
  • ACK_CONFIG when receiving the REQ_CONFIG message transmitted from the portal client, the portal server returns, to the portal client, the URL of the authentication page of the portal server, wherein the ACK_CONFIG message include a URL field carrying the URL of the authentication page of the portal server; and the URL field is organized according to the TLV format;
  • the portal client when receiving an ACK_JOIN message with its ErrCode field being 0, the portal client transmits an INFO_NOTIFY message to the portal server transmitting the ACK_JOIN message, the INFO_notify message carries an IP address of the portal client and an IP address pool locally configured at the portal client, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client change(s), the portal client transmits, to the portal server transmitting the ACK_JOIN message, an INFO_NOTIFY message carrying the changed IP address of the portal client and/or the changed IP address pool locally configured at the portal client; after the portal server transmits an ACK_CONFIG with its Errcode field being 0 to the portal client and when the URL of the authentication page of the portal server changes, the portal server carries the changed URL in the INFO_NOTIFY message and transmits the INFO_NOTIFY message to the portal client, wherein the ACK_CONFIG message includes
  • the URL field is organized according to the TLV format; the portal server carries load information in the INFO_NOTIFY message and transmits the INFO_NOTIFY message to a portal client matching the portal server; wherein a server state (Server-State) field of the INFO_NOTIFY message carries the load information of the portal server, for example, it is defined as an idle state when the load of the portal server is smaller than a preset threshold, and defined as a busy state when the load of the portal server is not smaller than the preset threshold, and below convention can be made to the Server-State field: when the Server-State field is binary 1, it indicates that the portal server is in the busy state, when the Server-State field is binary 0, it indicates that the portal server is in the idle state; after the portal server upgrades its portal protocol and/or function and then it matches a portal client which doesn't match the portal server before the upgrading, the portal server carries information that it matches the portal client in the INFO_NOTIFY message and then transmits the INFO_
  • Fig. 3 is a first flow chart of a device management method according to an embodiment of the disclosure, as shown in Fig. 3 , the method includes:
  • the portal server that the portal client requests to join is a portal server pre-configured to perform network access authentication of the portal client, and there are one or more such portal servers; the portal client transmits a REQ_JOIN message to the portal server to request to join the portal server, wherein the message carries information regarding a portal protocol version and function required by the portal client.
  • Step 302 the portal server returns a matching result to the portal client.
  • the portal server determines, according to received information regarding a portal protocol version and function required by the portal client carried in the REQ_JOIN message, whether a portal protocol version and function supported by the portal server match those required by the portal client, if yes, the portal server returns, to the portal client, an ACK_JOIN message with its ErrCode field being 0; otherwise, the portal server returns, to the portal client, an ACK_JOIN message with its Errcode field being 1.
  • the above steps 301 and 302 are a processing process of establishing an instance connection between the portal client and the portal server through capability negotiation.
  • Step 303 the portal client labels a valid instance of the portal client and the portal server having an instance connection therebetween.
  • the portal client records the currently established instance connection by labeling a valid instance, when the portal server returns the ACK_JOIN message with its ErrCode field being 0 to the portal client, it represents that the portal server returning the ACK_JOIN message matches the portal client and the portal client and the portal server has established the instance connection therebetween; accordingly, the portal client labels a valid instance of the portal server including the portal client and returning the CK_JOIN message.
  • steps 301 to 303 can be exemplified as below: when a portal client B requests to join a portal server A 1 and a portal server A 2 , if the portal server A 1 returns an ACK_JOIN message with its ErrCode field being 0, it represents that the portal server A 1 and the portal client B establish an instance connection through capability negotiation, and then the portal client B sets a valid instance ⁇ portal client B, portal server A 1 >.
  • Step 304 the portal client requests the portal server having the instance connection established with the portal client for a URL of an authentication page.
  • the portal client transmits an REQ_CONFIG message to a portal server in the set valid instance so as to request for URL information of the authentication page of the portal server.
  • Step 305 the portal server returns the URL of the authentication page to the portal client; the portal server carries the URL information of the authentication page in the ACK_CONFIG message and returns the message to the portal server.
  • Step 306 the portal client announces, to the portal server having the instance connection with the portal client, an IP address of the portal client and/or an IP address pool locally configured at the portal client; the portal client carries the announced information in an INFO_NOTIFY message and transmits the message to a portal server in the set valid instance.
  • steps 304 and 306 implemented by the portal client can be swapped.
  • Step 307 the portal server acknowledges that the IP address of the portal client and the IP address pool locally configured at the portal client have been saved.
  • the portal server acknowledges, through transmitting the INFO_NOTIFY message, that the information announced by the portal client has been saved.
  • Step 308 the portal server announces load information and/or a changed URL of the authentication page to the portal client having the instance connection established with the configured portal server.
  • the information announced by the portal server is carried in the INFO_NOTIFY message transmitted to the portal client having the instance connection established with the portal server.
  • Step 309 the portal client updates the established instance connection and/or the URL of the authentication page of the portal server.
  • step 308 the portal server announces that it is in a busy state, the portal client having the instance connection established with the portal server in this step is disconnected temporarily; accordingly, if the portal client receives subsequently an INFO_NOTIFY message announcing that the portal server is in an idle state, the temporarily-disconnected instance connection is recovered; if in step 308 the portal server announces a changed URL of the authentication page of the portal server, the portal client having the instance connection established with the portal server in this step updates its saved URL of the authentication page of the portal server.
  • Step 310 the portal client acknowledges that the established instance connection and/or the URL of the authentication page of the portal server have been updated.
  • the portal client carries the acknowledge information in an ACK_INFO_NOTIFY message and transmits the message to a portal server matching the portal client.
  • Step 311 a user client and the portal client establishes a connection therebetween.
  • the user client and the portal client interact with each other according to specifications of Transmission Control Protocol/Internet Protocol (TCP/IP) to establish the connection.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • Step 312 the portal client determines the portal server having the instance connection established with the portal client as a portal server that performs mandatory authentication of the user client.
  • the portal server having the instance connection established with the portal client is in an idle state, thus the portal server determines a portal server in a currently labeled valid instance as the portal server that performs mandatory authentication of the user client.
  • Step 313 the portal client announces a URL of an authentication page of the determined portal server to the portal client.
  • the user client logs in to an authentication page of the portal server corresponding to the announced URL, the portal server acquires, through the authentication page, authentication information of the user client, which includes a user name and a password.
  • Step 314 the portal client logs in to the authentication page of the portal server according to the URL.
  • Step 315 the portal server transmits an authentication request to a portal client supporting the user client.
  • the authentication request carries the authentication information of the user client which is acquired from the authentication page by the user client.
  • the portal server queries the saved IP address of the portal client and the saved IP address pool locally configured at the portal client by being indexed by an IP address of the user client to determine an IP address of a portal client supporting the user client and to transmit, according to the IP address, the authentication request to the portal client supporting the user client.
  • Step 316 the portal client returns an authentication result to the portal server.
  • the portal client performs network access authentication of the user client according to the authentication information that is carried in the authentication request message and includes the user name and password of the user client.
  • Step 317 the portal server pushes an authentication result page to the user client.
  • step 316 the portal client returns authentication success information, the portal server pushes an authentication success page, then proceed to step 317; otherwise, the portal server pushes an authentication failure page and then the processing ends.
  • Step 318 the portal client authorizes the user client to get network access.
  • the portal server when a portal client doesn't match a portal client request to join therein, stores a portal protocol version and function required by the portal client; when the portal server upgrades its portal protocol and/or function, it forcibly separates from a portal client matching the portal server to disconnect an instance connection, the portal server and portal client having the instance connection therebetween disconnected perform capability negotiation so that after the upgrading the portal server determines whether it match the portal client having its instance connection disconnected, and the instance connection is re-established when the two match; when the upgraded portal server determines, according to the saved portal protocol version and function required by the non-matching portal client before the upgrading, that it matches the portal client that the portal server doesn't match before the upgrading, the portal server announces the matching to the portal client to establish an instance connection with the portal client.
  • Fig. 4 is a second flow chart of a device management method according to an embodiment of the disclosure, as shown in Fig. 4 , the method includes:
  • the portal server that the portal client requests to join is a portal server pre-configured to perform network access authentication of the portal client.
  • the portal client transmits a REQ_JOIN message to the portal server to request to join the portal server, wherein the message carries information regarding a portal protocol version and function required by the portal client.
  • Step 402 the portal server returns a matching result to the portal client.
  • the portal server determines, according to received information regarding a portal protocol version and function required by the portal client carried in the REQ_JOIN message, whether the portal server matches the portal client, if yes, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 0 to return matching success information; otherwise, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 1 to return non-matching information, and saves a portal protocol version and function required by a non-matching portal client.
  • the above steps 401 and 402 are a processing process of establishing an instance connection between the portal client and the portal server through capability negotiation.
  • Step 403 the portal client labels a valid instance between the portal client and the portal server having the instance connection therebetween.
  • the portal client records the currently established instance connection by labeling a valid instance, the processing of steps 401 to 403 can be exemplified as below: a portal client B requests to join a portal server A 1 and a portal server A 2 , in step 402 the portal server A 1 returns matching success information and the portal server A 2 returns non-matching information, then the portal client B sets a valid instance ⁇ portal client B, portal server A 1 >.
  • Step 404 when the portal server upgrades its portal protocol and/or function, the portal server forcibly separates from management of a matching portal client.
  • the portal server requests to forcibly separate from the management of the portal client through transmitting a FORCE_LEAVE to the matching portal client so as to disconnect the instance connection with the portal client.
  • Step 405 the portal client acknowledges that the portal server has separated from its management.
  • the portal client When receiving the FORCE_LEAVE message, the portal client cancels setting a valid instance including the portal server transmitting the FORCE_LEAVE message, and returns an ACK_FORCE_LEAVE message to the portal server to announce that the portal server has separated from its management.
  • steps 401 to 403 is exemplified as below: when upgrading its portal protocol and/or function, a portal server A 1 transmits a FORCE_LEAVE message to its matching portal client B, the portal client B cancels its set valid instance ⁇ portal client B, portal server A 1 >, and returns an ACK_FORCE_LEAVE message to the portal server A 1 to announce that the portal server A 1 has separated from its management.
  • Step 406 the portal client requests to join a portal server upgrading its portal protocol and/or function.
  • the portal client periodically transmits a REQ_JOIN message to the portal server that have separated from its management to request to re-join.
  • Step 407 the portal server after completing its portal protocol and/or function upgrading returns matching result information to a portal client requesting to join.
  • the portal server determines after upgrading its portal protocol and/or function whether the updated portal protocol and/or function match a portal protocol and function required by the portal client requesting to join, if yes, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 0 to return matching success information, and proceed to step 408; otherwise, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 1 to return non-matching information, stores a portal protocol version and function required by a non-matching portal client, and ends the processing.
  • the above steps 406 and 407 are a processing process of performing capability negotiation by the portal client and the portal server having their instance connection disconnected.
  • Step 408 the portal client labels a valid instance of the portal client and the portal server having the instance connection therebetween.
  • steps 406 to 408 can be exemplified as below: when a portal client B requests to re-join a portal server A 1 that has forcibly separated from its management in step405, if the portal server A 1 returns matching success information to the portal client B, it represents that the portal server A 1 and the portal client B establish an instance connection through capability negotiation, and then the portal client B sets a valid instance ⁇ portal client B, portal server A 1 >.
  • Step 409 the portal server after the portal protocol and/or function upgrading announces matching information to its matching portal client.
  • the portal server determines, according to a portal protocol version and function required by the non-matching portal client before the upgrading and stored in step 402, determines that the portal server after the upgrading matches a portal server that doesn't match it before the upgrading, the portal server transmits an INFO_NOTIFY message to the portal client to announce that the portal server matches the portal client, and when the portal client receives the INFO_NOTIFY message and determines that the portal server matches the portal client, the portal client performs capability negotiation to establish an instance connection, and the specific processing process is the same as steps 401 to 403.
  • a portal client when upgrading its portal protocol, requests to separate from management of a portal server matching the portal client to disconnect an instance connection, and performs capability negotiation after the upgrading; when an IP address of the portal client and an IP address pool locally configured at the portal client changes, a portal server matching the portal client updates, according to an announcement from the portal client, a saved IP address of the portal client and saved IP address pool locally configured at the portal client.
  • Fig. 5 is a flow chart of a device management method according to an embodiment of the disclosure, as shown in Fig. 5 , the method includes:
  • the portal client When upgrading its portal protocol, the portal client cancels a set valid instance, transmits an ASK_LEAVE message to a portal server included in the canceled valid instance, and requests for separation from the management of the portal server so as to disconnect an instance connection with the portal client.
  • Step 502 the portal server matching the portal client acknowledges that the portal client has separated from its management.
  • the portal server When receiving the ASK_LEAVE message, the portal server labels the portal client as a non-matching portal client, and transmits an ACK_LEAVE message to the portal client to announce that the portal client has separated from its management.
  • step 503 a portal client after the portal protocol upgrading requests to join a portal server.
  • the portal server that the portal client requests to join is a portal server pre-configured to perform network access authentication of the portal client.
  • the portal client transmits a REQ_JOIN message to the portal server, wherein the message carries information regarding a portal protocol version and function required by the portal client.
  • Step 504 the portal server returns a matching result to the portal client after the upgrading that requests to join.
  • the portal server determines, according to received information regarding a required portal protocol version and function carried in the REQ_JOIN message, whether the portal server matches the portal client, if yes, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 0 to return matching success information; otherwise, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 1 to return non-matching information, and saves a portal protocol version and function required by a non-matching portal client.
  • the above steps 503 and 504 are a processing process of performing capability negotiation by the portal client and the portal server having their instance connection disconnected.
  • Step 505 the portal client after the upgrading sets a valid instance between the portal client and the portal server having the instance connection therebetween.
  • the portal client records the currently established instance connection by labeling a valid instance, when the portal client after the upgrading receives an ACK_JOIN message with its ErrCode field being 0 returned by the portal server, it represents that the portal server returning the ACK_JOIN message matches the portal client after the upgrading, and then the portal client after the upgrading sets a valid instance of the portal server including the portal client and returning the CK_JOIN message.
  • a portal client B after the upgrading requests to join a portal server A 1 and a portal server A 2 , if the portal server A 1 returns an ACK_JOIN message with its ErrCode field being 0, it represents that the portal server A 1 and the portal client B establish an instance connection through capability negotiation, and then the portal client B sets a valid instance ⁇ portal client B, portal server A 1 >.
  • Step 506 when an IP address of the portal client and/or an IP address pool locally configured at the portal client, the portal client announces the changed IP address of the portal client and/or the changed IP address pool locally configured at the portal client to the portal server having the instance connection established with the portal client.
  • the changed IP address of the portal client and/or the changed IP address pool locally configured at the portal client are carried in an INFO_NOTIFY message.
  • Step 507 the portal server acknowledges that the IP address of the portal client and the IP address pool locally configured at the portal client have been updated.
  • the portal server receives the IP address of the portal client and/or the IP address pool locally configured at the portal client, which are carried in the INFO_NOTIFY message, updates its stored IP address of the portal client and/or IP address pool locally configured at the portal client, and returns an ACK_INFO_NOTIFY to acknowledge that the IP address and IP address pool have been updated.

Abstract

Disclosed is a portal device management method, and the method includes: an instance connection between a portal client and a pre-configured portal server is established through capability negotiation; and each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end. Further disclosed are a portal device and a portal system, in the embodiments of the disclosure, an instance connection is established between a portal server and a portal client, and load balancing of the portal server is implemented based on the established instance connection; it is possible to solve the problem that the portal client and the portal server cannot upgrade smoothly; information such as a public key of an asymmetrical algorithm and an IP address pool can be automatically announced between the portal client and the portal server without manual configuration operations, thereby result in convenient and secure operation and maintenance.

Description

    TECHNICAL FIELD
  • The present disclosure relates to network communication techniques, and in particular to a portal device management method, a portal device and a portal system.
  • BACKGROUD
  • Web authentication techniques are widely used in scenarios such as a campus network where network access authorization is performed after users go online, and corresponding Web authentication techniques have the following problems:
    • A portal client's selection of a portal server that performs mandatory authentication of a user client has a simple processing logic so that the portal client cannot sense the state of the portal server or accept an indication of load sharing made by the portal server, and when a portal server selected by the portal client for performing mandatory authentication of the user client is busy, the portal server fails to process in time a HyperText Transfer Protocol (HTTP) request from the user client and to push an authentication page to the user client or acquire authentication information of the user client so that the portal client fails to perform in time network authorization on the user client or an authentication failure may even be resulted, thus impacting user experiences;
    • when information of the portal client and of the portal server such as an Internet Protocol (IP) address pool of the user client locally configured at the portal client changes, it is required to make corresponding changes manually on the portal server side, resulting in tedious operation and maintenance;
    • when the portal client and the portal server upgrade its portal protocol, a synchronous upgrading needs to be performed on the portal server and the portal client, resulting in tedious operation and maintenance; and
    • in order to encrypt authentication information of the user client, it is required to configure an encryption key and a decryption key symmetrically on the portal server and the portal client, and these operations impose high requirements for manual intervention, resulting in tedious operation and maintenance with poor security.
    SUMMARY
  • In view of the above, the embodiments of the disclosure are intended to provide a portal device management method, a portal device and a portal system so that it is possible to achieve the aim of load balancing, the portal client and the portal server can upgrade smoothly, and each of the portal client and the pre-configured portal server can announce its information to its opposite end, thus resulting in convenient and secure operation and maintenance.
  • To this end, the technical solutions of embodiments of the disclosure are implemented as follows.
  • An embodiment of the disclosure provides a portal device management method including:
    • an instance connection between a portal client and a pre-configured portal server is established through capability negotiation; and
    • each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end.
  • In an embodiment, the step that an instance connection between a portal client and a pre-configured portal server is established through capability negotiation may include:
    • the instance connection between the portal client and the pre-configured portal server is established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  • In an embodiment, the method may further include:
    • the pre-configured portal server having the instance connection established with the portal client is determined as a portal server that performs mandatory authentication of a user client supported by the portal client.
  • In an embodiment, after the instance connection between the portal client and the pre-configured portal server is established through capability negotiation, the method may further include:
    • the instance connection between the portal client and the pre-configured portal server is disconnected when the portal client upgrades its portal protocol, and the instance connection between the portal client and the pre-configured portal server is re-established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  • In an embodiment, after the instance connection between the portal client and the pre-configured portal server is established through capability negotiation, the method may further include:
    • the instance connection between the portal client and the pre-configured portal server is disconnected when the pre-configured portal server having the instance connection established with the portal client upgrades its portal protocol and/or function, and the instance connection between the portal client and the pre-configured portal server is re-established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server after the upgrading.
  • In an embodiment, the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include:
    • the pre-configured portal server announces its load information to the portal client having the instance connection established with the pre-configured portal server; and the method may further include: the portal client updates the instance connection between the portal client and the pre-configured portal server according to the load information.
  • In an embodiment, the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include:
    • the portal client announces, to the pre-configured portal server having the instance connection with the portal client, an IP address of a user client supported by the portal client or an IP address pool locally configured at the portal client, and when the IP address of the user client supported by the portal client and/or the IP address pool locally configured at the portal client changes, the portal client announces the changed IP address or changed IP address pool to the pre-configured portal server having the instance connection with the portal client; and
    • the pre-configured portal server announces a Uniform Resource Locator (URL) of its authentication page to the portal client having the instance connection established with the pre-configured portal server, and when the URL of the authentication page changes, announces the changed URL to the portal client having the instance connection established with the pre-configured portal server.
  • In an embodiment, the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include:
    • the pre-configured portal server announces a public key of an asymmetric encryption algorithm to the portal client having the instance connection established with the pre-configured portal server.
  • An embodiment of the disclosure further provides a portal client including a first negotiation and connection module and a first announcement module, wherein
    • the first negotiation and connection module is configured to establish an instance connection with a pre-configured portal server through capability negotiation; and
    • the first announcement module is configured to announce information of the portal client to the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  • In an embodiment, the first negotiation and connection module may be further configured to establish the instance connection with the pre-configured portal server when determining through capability negotiation with the pre-configured portal server that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  • In an embodiment, the portal client may further include:
    • a determination module configured to determine the pre-configured portal server having the instance connection established with the first negotiation and connection module as a portal server that performs mandatory authentication of a user client supported by the portal client.
  • In an embodiment, the first negotiation and connection module may be further configured to disconnect the instance connection with the pre-configured portal server when the portal client upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server when determining through capability negotiation with the pre-configured portal server that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  • In an embodiment, the first negotiation and connection module may be further configured to update the instance connection with the pre-configured portal server according to load information announced by the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  • In an embodiment, the first announcement module may be configured to announce an IP address of the portal client and an IP address pool locally configured at the portal client to the pre-configured portal server having the instance connection established with the first negotiation and connection module, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  • An embodiment of the disclosure further provides a portal server including a second negotiation and connection module and a second announcement module, wherein
    • the second negotiation and connection module is configured to establish an instance connection with a portal client through capability negotiation; and
    • the second announcement module is configured to announce information of the portal server to the portal client having the instance connection established with the second negotiation and connection module.
  • In an embodiment, the second negotiation and connection module may be further configured to establish the instance connection with the portal client when determining through capability negotiation with the portal client that a portal protocol version and function required by the portal client match a portal version and function supported by the portal server.
  • In an embodiment, the second negotiation and connection module may be further configured to disconnect the instance connection with the portal client when the portal server upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client when determining through capability negotiation with the portal client that a portal protocol version and function required by the portal client match a portal version and function supported by the portal server after the upgrading.
  • In an embodiment, the second announcement module may be configured to announce load information of the portal server to the portal client having the instance connection established with the portal server.
  • In an embodiment, the second announcement module may be further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server to the portal client having the instance connection established with the portal server, and when the URL of the authentication page changes, announce the changed URL to the portal client having the instance connection established with the portal server.
  • In an embodiment, the second announcement module may be further configured to announce a public key of an asymmetric encryption algorithm to the portal client having the instance connection established with the portal server.
  • An embodiment of the disclosure further provides a portal system including a pre-configured portal client and a portal server, wherein
    • the pre-configured portal server is configured to establish an instance connection with the portal client through capability negotiation, and announce its information to the portal client having the instance connection established with the pre-configured portal server; and
    • the portal client is configured to establish the instance connection with the pre-configured portal server through capability negotiation, and announce its information to the pre-configured portal server having the instance connection established with the portal client.
  • In an embodiment, the portal client may include a first negotiation and connection module, a first announcement module and a determination module; and the pre-configured portal server may include a second negotiation and connection module and a second announcement module; and respective modules have same functions as those of the modules described above.
  • In the technical solutions according to the embodiments of the disclosure, the portal client and portal server establish an instance connection therebetween through capability negotiation, and when the portal client or the portal server performs upgrading, the portal client or portal server can perform single-side smooth upgrading through disconnection of the instance connection without disruption of an authentication processing operation of the portal server or portal client that doesn't performs the upgrading, thus it is possible to solve a problem of tedious operation and maintenance resulted from the fact in the prior art that a portal client and a portal server matching the portal client must upgrade synchronously;
    • the portal client announces changed IP address and/or changed IP address pool to the portal server having the instance connection established with the portal client, and a changed URL and a public key of an asymmetric encryption algorithm are announced to the portal client having the instance connection established with the portal server, thus there is no need to perform configuration on devices to modify announced information, thereby resulting in convenient and secure operation and maintenance; and
    • the portal server having the instance connection established with the portal client is determined as a portal server that performs mandatory authentication of a user client supported by the portal client, and the established instance connection is updated according to load information of the portal server, thus it is possible to balance loads of the portal server and improve efficiency of authentication of user clients.
    BRIEF DESCRIPTION OF THE DRAWINGS
    • Fig. 1 is a flow chart of a portal device management method according to an embodiment of the disclosure;
    • Fig, 2 is a schematic structural diagram of a portal system according to an embodiment of the disclosure;
    • Fig. 3 is a first flow chart for implementing portal device management according to an embodiment of the disclosure;
    • Fig. 4 is a second flow chart for implementing portal device management according to an embodiment of the disclosure; and
    • Fig. 5 is a third flow chart for implementing portal device management according to an embodiment of the disclosure.
    DETAILED DESCRIPTION
  • The disclosure will be further elaborated below in combination with accompanying drawings and specific embodiments.
  • Fig. 1 is a flow chart of a portal device management method according to an embodiment of the disclosure, as shown in Fig. 1, the method includes:
    • step 101, an instance connection between a portal client and a pre-configured portal server is established through capability negotiation.
  • The portal client and the portal server are devices that perform network access authentication of a user client, and the network access authentication of the user client can be done through cooperation of the portal server and a portal client supporting the user client.
  • As a preferred implementation, the step that an instance connection between a portal client and a pre-configured portal server is established through capability negotiation may include: the instance connection between the portal client and the pre-configured portal server is established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  • As a preferred implementation, the pre-configured portal server having the instance connection established with the portal client is determined as a portal server that performs mandatory authentication of a user client supported by the portal client.
  • A processing process of network access authentication of the user client performed by the portal client and the determined portal server performing the mandatory authentication complies with portal protocol specifications.
  • As a preferred implementation, after the instance connection between the portal client and the pre-configured portal server is established through capability negotiation, the instance connection between the portal client and the pre-configured portal server is disconnected when the portal client upgrades its portal protocol, and the instance connection between the portal client and the pre-configured portal server is re-established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  • Since the portal client and the portal server have their portal protocol versions and functions matching each other before the upgrading may not match each other any more after the upgrading, in order to avoid configuring a portal server not matching the portal client to perform mandatory authentication of the portal client, it is required to disconnect firstly the instance connection between the portal server and the portal client and then re-establish the instance connection after determination of matching.
  • As a preferred implementation, after the instance connection between the portal client and the pre-configured portal server is established through capability negotiation, the instance connection between the portal client and the pre-configured portal server is disconnected when the pre-configured portal server having the instance connection established with the portal client upgrades its portal protocol and/or function, and the instance connection between the portal client and the pre-configured portal server is re-established when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server after the upgrading.
  • Step 102, each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end.
  • As a preferred implementation, the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include: the pre-configured portal server announces its load information to the portal client having the instance connection established with the pre-configured portal server; and the method may further include: the portal client updates the instance connection between the portal client and the pre-configured portal server according to the load information.
  • If the portal client determines according to load information that a current load of the client server exceeds a preset threshold, the instance connection with the portal server is disconnected temporarily; if subsequently the portal client determines according to the load information announced by the portal server that a current load of the client server doesn't exceed the preset threshold, the temporarily-disconnected instance connection is recovered.
  • The load information of the portal server may include a description of the number of authentication requests from user clients currently processed by the portal server, and may also include a description of hardware load of the portal server, where the hardware load includes but is not limited to utilization rate of CPU, utilization rate of memory and utilization rate of network bandwidth.
  • As a preferred implementation, the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include: the portal client announces, to the pre-configured portal server having the instance connection with the portal client, an IP address of the portal client or an IP address pool locally configured at the portal client, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client changes, the portal client announces the changed IP address and/or changed IP address pool to the pre-configured portal server having the instance connection with the portal client; and
    the pre-configured portal server announces a URL of its authentication page to the portal client having the instance connection established with the pre-configured portal server, and when the URL of the authentication page changes, announces the changed URL to the portal client having the instance connection established with the pre-configured portal server.
  • When the portal server and the portal client perform network access authentication of a user client, the portal client needs to announce a URL of an authentication page of the portal server to the user client so as to re-direct the user client to the authentication page of the portal server; the portal server needs to determine, through an IP address of the portal client and information of an IP address pool of the user client which is locally configured at the portal client, an IP address of a portal client supporting the user client, and announces authentication information of the user client acquired through the authentication page to the portal client supporting the user client so that the authentication information of the user client can be verified by the portal client supporting the user client.
  • As a preferred implementation, the step that each of the portal client and the pre-configured portal server having the instance connection established therebetween announces its information to its opposite end may include: the pre-configured portal server announces a public key of an asymmetric encryption algorithm to the portal client.
  • It should be noted that the announced information described in the embodiment of the disclosure is not limited to what described herein, each of the portal client and portal server having the instance connection established therebetween can announces, to its opposite end, other information required during subsequent mandatory authentication of a user client, for example, a type of a protocol required during the authentication can be announced between the portal client and the portal server.
  • Fig, 2 is a schematic structural diagram of a portal system according to an embodiment of the disclosure, as shown in Fig. 2, the system includes a portal client 21 and a pre-configured portal server 22,
    the portal client 21 is configured to establish an instance connection with the pre-configured portal server 22 through capability negotiation, and announce its information to the pre-configured portal server 22 having the instance connection established with the portal client 21; and
    the pre-configured portal server 22 is configured to establish the instance connection with the portal client 21 through capability negotiation, and announce its information to the portal client 21 having the instance connection established with the pre-configured portal server 22.
  • The portal client 21 is further configured to establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the pre-configured portal server 22.
  • The portal client 21 is further configured to determine the pre-configured portal server 22 having the instance connection established with the portal client 21 as a portal server 22 that performs mandatory authentication of a user client supported by the portal client 21.
  • The portal client 21 is further configured to disconnect the instance connection with the pre-configured portal server 22 when the portal client 21 upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 after the upgrading match a portal version and function supported by the pre-configured portal server 22.
  • The portal client 21 is further configured to update the instance connection with the pre-configured portal server 22 according to load information announced by the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 221.
  • The portal client 21 is further configured to announce an IP address of the portal client 21 and an IP address pool locally configured at the portal client to the pre-configured portal server 22 having the instance connection established with the portal client 21, and when the IP address of the portal client 21 and/or the IP address pool locally configured at the portal client change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server 22 having the instance connection established with the portal client 21.
  • The pre-configured portal server 22 is further configured to establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22.
  • The pre-configured portal server is further configured to disconnect the instance connection with the portal client 21 when the portal server 22 upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22 after the upgrading.
  • The pre-configured portal server 22 is further configured to announce its load information to the portal client 21 having the instance connection established with the portal server 22.
  • The pre-configured portal server 22 is further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server 22 to the portal client 21 having the instance connection established with the portal server 22, and when the URL of the authentication page changes, announce the changed URL to the portal client 21 having the instance connection established with the portal server 22.
  • The pre-configured portal server is further configured to announce a public key of an asymmetric encryption algorithm to the portal client 21 having the instance connection established with the pre-configured portal server 22.
  • The portal client 21 includes a first negotiation and connection module 211 and a first announcement module 212,
    the first negotiation and connection module 211 is configured to establish an instance connection with a pre-configured portal server 22 through capability negotiation; and
    the first announcement module 212 is configured to announce information of the portal client 21 to the pre-configured portal server having the instance connection established with the first negotiation and connection module 211.
  • Specifically, the first negotiation and connection module 211 is further configured to establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the pre-configured portal server 22.
  • In an embodiment, the portal client 21 further include a determination module 213 configured to determine the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211 as a portal server 22 that performs mandatory authentication of a user client supported by the portal client 21.
  • The first negotiation and connection module 211 is further configured to disconnect the instance connection with the pre-configured portal server 22 when the portal client 21 upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server 22 when determining through capability negotiation with the pre-configured portal server 22 that a portal protocol version and function required by the portal client 21 after the upgrading match a portal version and function supported by the pre-configured portal server 22.
  • The first negotiation and connection module 211 is further configured to update the instance connection with the pre-configured portal server 22 according to load information announced by the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211.
  • The first announcement module 212 is further configured to announce an IP address of the portal client 21 and an IP address pool locally configured at the portal client 21 to the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211, and when the IP address of the portal client 21 and/or the IP address pool locally configured at the portal client 21 change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server 22 having the instance connection established with the first negotiation and connection module 211.
  • In practical applications, the first negotiation and connection module 211, the first announcement module 212 and the determination module 213 can all be implemented by a Central Processing Unit (CPU), a Digital Signal Processor (DSP) or a Field-Programmable Gate Array (FPGA) in the portal client 21.
  • The portal server 22 includes a second negotiation and connection module 221 and a second announcement module 222,
    the second negotiation and connection module 221 is configured to establish an instance connection with a portal client 21 through capability negotiation; and
    the second announcement module 222 is configured to announce information of the portal server 22 to the portal client 21 having the instance connection established with the second negotiation and connection module 221.
  • The second negotiation and connection module 221 is further configured to establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22.
  • The second negotiation and connection module 221 is further configured to disconnect the instance connection with the portal client 21 when the portal server 22 upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client 21 when determining through capability negotiation with the portal client 21 that a portal protocol version and function required by the portal client 21 match a portal version and function supported by the portal server 22 after the upgrading.
  • The second announcement module 222 is configured to announce load information of the portal server 22 to the portal client 21 having the instance connection established with the portal server 22.
  • The second announcement module 222 is further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server 22 to the portal client 21 having the instance connection established with the portal server 22, and when the URL of the authentication page changes, announce the changed URL to the portal client 21 having the instance connection established with the portal server 22.
  • The second announcement module 222 is further configured to announce a public key of an asymmetric encryption algorithm to the portal client 21 having the instance connection established with the portal server 22.
  • In practical applications, the second negotiation and connection module 221 and the second announcement module 222 can both be implemented by a CPU, DSP or FPGA in the portal server 22.
  • In below embodiments, since a type of interactive message (the message type value is from 0x1 to 0x10) between a portal client and a portal server defined by existing portal protocols cannot meet requirements from interaction between the portal client and the portal server according to embodiments of the disclosure, it is required to extend the type of message defined by the existing portal protocols. For example, it can be extended to types of messages as follows.
  • REQ_JOIN message with its value being 0x11: when requesting to join the portal server, the portal client transmits a REQ_JOIN message to the portal server, wherein the REQ_JOIN message carries a c and function required by the portal client, and after receiving the message, the portal server determines whether a portal protocol version and function supported by the portal server match the portal protocol version and function required by the portal client (hereinafter the matching of the portal protocol version and function supported by the portal server and the portal protocol and function required by the portal client is referred simply as the matching of the portal server and the portal client); the REQ_JOIN message includes a capability parameter field with variable field length configured to carry information regarding the portal protocol version and function required by the portal client, and the capability parameter field is organized according to a Type length Value (TLV) format;
  • ACK_JOIN message with its value being 0x12: after receiving the REQ_JOIN message and determining a matching result, the portal server carries the matching result in an ACK_JOIN message and transmits the ACK_JOIN message to the portal client, if an ErrCode field of the ACK_JOIN message is 0, it indicates that the portal server matches the portal client requesting to join therein, and if the ErrCode field of the ACK_JOIN message is 1, it indicates that the portal server doesn't match the portal client requesting to join therein; the ACK_JOIN message may further include an authentication method (Authen-Method) field with its length being 1 bit, for example, a value of the field being 0, 1 or 2 indicates that protocols used during authentication performed by the portal server and the portal client are respectively a Challenge Handshake Authentication Protocol (CHAP), a Password Authentication Protocol (PAP) or an Extensible Authentication Protocol (EAP);
  • REQ_CONFIG message with its value being 0x13: when the portal client receives the ACK_JOIN message, if an ErrCode field of the message is 0, a REQ_CONFIG message is transmitted to the portal server transmitting the ACK_JOIN message to request for a URL of an authentication page of the portal server;
  • ACK_CONFIG with its value being 0x14: when receiving the REQ_CONFIG message transmitted from the portal client, the portal server returns, to the portal client, the URL of the authentication page of the portal server, wherein the ACK_CONFIG message include a URL field carrying the URL of the authentication page of the portal server; and the URL field is organized according to the TLV format;
  • INFO_NOTIFY message with its value being 0x15: when receiving an ACK_JOIN message with its ErrCode field being 0, the portal client transmits an INFO_NOTIFY message to the portal server transmitting the ACK_JOIN message, the INFO_notify message carries an IP address of the portal client and an IP address pool locally configured at the portal client, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client change(s), the portal client transmits, to the portal server transmitting the ACK_JOIN message, an INFO_NOTIFY message carrying the changed IP address of the portal client and/or the changed IP address pool locally configured at the portal client; after the portal server transmits an ACK_CONFIG with its Errcode field being 0 to the portal client and when the URL of the authentication page of the portal server changes, the portal server carries the changed URL in the INFO_NOTIFY message and transmits the INFO_NOTIFY message to the portal client, wherein the ACK_CONFIG message includes a URL field carrying a URL of the authentication page of the portal server. The URL field is organized according to the TLV format; the portal server carries load information in the INFO_NOTIFY message and transmits the INFO_NOTIFY message to a portal client matching the portal server;
    wherein a server state (Server-State) field of the INFO_NOTIFY message carries the load information of the portal server, for example, it is defined as an idle state when the load of the portal server is smaller than a preset threshold, and defined as a busy state when the load of the portal server is not smaller than the preset threshold, and below convention can be made to the Server-State field: when the Server-State field is binary 1, it indicates that the portal server is in the busy state, when the Server-State field is binary 0, it indicates that the portal server is in the idle state; after the portal server upgrades its portal protocol and/or function and then it matches a portal client which doesn't match the portal server before the upgrading, the portal server carries information that it matches the portal client in the INFO_NOTIFY message and then transmits the INFO_NOTIFY message to the portal client;
    ACK_INFO_NOTIFY message with its value being 0x16: when receiving the INFO_NOTIFY message, the portal client returns an ACK_INFO_NOTIFY message to the portal server transmitting the INFO_NOFITY message to acknowledge that the URL of the portal server has been updated; when receiving the INFO_NOTIFY message, the portal server returns the CK_INFO_NOTIFY to the portal client transmitting the INFO_NOTIFY message to acknowledge that the IP address of the portal client and/or the IP address pool locally configured at the portal client have been saved; when receiving an INFO_NOTIFY message carrying the load information of the portal server, the portal client returns the ACK_INFO_NOTIFY message to the portal client server transmitting the INFO_NOTIFY message to acknowledge that the established instance connection has been updated;
    FORCE_LEAVE message with its value being 0x17: when upgrading its portal protocol and/or function, the portal server transmits a FORCE_LEAVE message to a portal client matching the portal server to forcibly separate from the management of the portal client;
    ACK_FORCE_LEAVE message with its value being 0x18: when receiving the FORCE_LEAVE message transmitted from the portal server matching the portal client, the portal client cancels labeling the portal server as a portal server matching the portal client, and transmits an ACK_FORCE_LEAVE message to the portal server to announces that it has separated from the management of the portal server;
    REQ_LEAVE message with its value being 0x18: when upgrading its portal protocol, the portal client transmits a REQ_LEAVE message to the portal server matching the portal client to request for separation from management of the portal server;
    ACK_LEAVE message with its value being 0x1a: when receiving the REQ_LEAVE message transmitted from the portal client matching the portal server, the portal server labels the portal client as a portal client not matching the portal server, and transmits an ACK_LEAVE message to the portal client to announce that the portal client has separated from management.
  • In a preferred embodiment of the disclosure, when a portal protocol version and function supported by a portal server match a portal protocol version and function required by a portal client, the portal client establishes an instance connection with the portal server; the portal client announces an IP address of the portal client and an IP address pool locally configured at the portal client to the portal server having the instance connection established with the portal client, and requests the portal sever for a URL of an authentication page of the portal server; the portal client re-directs, a user client that has logged in, to the authentication page of the portal server having the instance connection established with the portal client so that the portal server acquires authentication information of the user client and network access authentication of the user client is performed according to the authentication information returned by the portal server. Fig. 3 is a first flow chart of a device management method according to an embodiment of the disclosure, as shown in Fig. 3, the method includes:
    • step 301, a portal client requests to join a portal server.
  • The portal server that the portal client requests to join is a portal server pre-configured to perform network access authentication of the portal client, and there are one or more such portal servers;
    the portal client transmits a REQ_JOIN message to the portal server to request to join the portal server, wherein the message carries information regarding a portal protocol version and function required by the portal client.
  • Step 302, the portal server returns a matching result to the portal client.
  • The portal server determines, according to received information regarding a portal protocol version and function required by the portal client carried in the REQ_JOIN message, whether a portal protocol version and function supported by the portal server match those required by the portal client, if yes, the portal server returns, to the portal client, an ACK_JOIN message with its ErrCode field being 0; otherwise, the portal server returns, to the portal client, an ACK_JOIN message with its Errcode field being 1.
  • The above steps 301 and 302 are a processing process of establishing an instance connection between the portal client and the portal server through capability negotiation.
  • Step 303, the portal client labels a valid instance of the portal client and the portal server having an instance connection therebetween.
  • The portal client records the currently established instance connection by labeling a valid instance, when the portal server returns the ACK_JOIN message with its ErrCode field being 0 to the portal client, it represents that the portal server returning the ACK_JOIN message matches the portal client and the portal client and the portal server has established the instance connection therebetween; accordingly, the portal client labels a valid instance of the portal server including the portal client and returning the CK_JOIN message.
  • The processing of steps 301 to 303 can be exemplified as below: when a portal client B requests to join a portal server A1 and a portal server A2, if the portal server A1 returns an ACK_JOIN message with its ErrCode field being 0, it represents that the portal server A1 and the portal client B establish an instance connection through capability negotiation, and then the portal client B sets a valid instance <portal client B, portal server A1>.
  • Step 304, the portal client requests the portal server having the instance connection established with the portal client for a URL of an authentication page.
  • The portal client transmits an REQ_CONFIG message to a portal server in the set valid instance so as to request for URL information of the authentication page of the portal server.
  • Step 305, the portal server returns the URL of the authentication page to the portal client;
    the portal server carries the URL information of the authentication page in the ACK_CONFIG message and returns the message to the portal server.
  • Step 306, the portal client announces, to the portal server having the instance connection with the portal client, an IP address of the portal client and/or an IP address pool locally configured at the portal client;
    the portal client carries the announced information in an INFO_NOTIFY message and transmits the message to a portal server in the set valid instance.
  • It should be noted that steps 304 and 306 implemented by the portal client can be swapped.
  • Step 307, the portal server acknowledges that the IP address of the portal client and the IP address pool locally configured at the portal client have been saved.
  • The portal server acknowledges, through transmitting the INFO_NOTIFY message, that the information announced by the portal client has been saved.
  • Step 308, the portal server announces load information and/or a changed URL of the authentication page to the portal client having the instance connection established with the configured portal server.
  • The information announced by the portal server is carried in the INFO_NOTIFY message transmitted to the portal client having the instance connection established with the portal server.
  • Step 309, the portal client updates the established instance connection and/or the URL of the authentication page of the portal server.
  • If in step 308 the portal server announces that it is in a busy state, the portal client having the instance connection established with the portal server in this step is disconnected temporarily; accordingly, if the portal client receives subsequently an INFO_NOTIFY message announcing that the portal server is in an idle state, the temporarily-disconnected instance connection is recovered; if in step 308 the portal server announces a changed URL of the authentication page of the portal server, the portal client having the instance connection established with the portal server in this step updates its saved URL of the authentication page of the portal server.
  • Step 310, the portal client acknowledges that the established instance connection and/or the URL of the authentication page of the portal server have been updated.
  • The portal client carries the acknowledge information in an ACK_INFO_NOTIFY message and transmits the message to a portal server matching the portal client.
  • Step 311, a user client and the portal client establishes a connection therebetween.
  • The user client and the portal client interact with each other according to specifications of Transmission Control Protocol/Internet Protocol (TCP/IP) to establish the connection.
  • Step 312, the portal client determines the portal server having the instance connection established with the portal client as a portal server that performs mandatory authentication of the user client.
  • The portal server having the instance connection established with the portal client is in an idle state, thus the portal server determines a portal server in a currently labeled valid instance as the portal server that performs mandatory authentication of the user client.
  • Step 313, the portal client announces a URL of an authentication page of the determined portal server to the portal client.
  • The user client logs in to an authentication page of the portal server corresponding to the announced URL, the portal server acquires, through the authentication page, authentication information of the user client, which includes a user name and a password.
  • Step 314, the portal client logs in to the authentication page of the portal server according to the URL.
  • Step 315, the portal server transmits an authentication request to a portal client supporting the user client.
  • The authentication request carries the authentication information of the user client which is acquired from the authentication page by the user client.
  • The portal server queries the saved IP address of the portal client and the saved IP address pool locally configured at the portal client by being indexed by an IP address of the user client to determine an IP address of a portal client supporting the user client and to transmit, according to the IP address, the authentication request to the portal client supporting the user client.
  • Step 316, the portal client returns an authentication result to the portal server.
  • The portal client performs network access authentication of the user client according to the authentication information that is carried in the authentication request message and includes the user name and password of the user client.
  • Step 317, the portal server pushes an authentication result page to the user client.
  • If in step 316 the portal client returns authentication success information, the portal server pushes an authentication success page, then proceed to step 317; otherwise, the portal server pushes an authentication failure page and then the processing ends.
  • Step 318, the portal client authorizes the user client to get network access.
  • In a preferred embodiment of the disclosure, when a portal client doesn't match a portal client request to join therein, the portal server stores a portal protocol version and function required by the portal client; when the portal server upgrades its portal protocol and/or function, it forcibly separates from a portal client matching the portal server to disconnect an instance connection, the portal server and portal client having the instance connection therebetween disconnected perform capability negotiation so that after the upgrading the portal server determines whether it match the portal client having its instance connection disconnected, and the instance connection is re-established when the two match; when the upgraded portal server determines, according to the saved portal protocol version and function required by the non-matching portal client before the upgrading, that it matches the portal client that the portal server doesn't match before the upgrading, the portal server announces the matching to the portal client to establish an instance connection with the portal client.
  • Fig. 4 is a second flow chart of a device management method according to an embodiment of the disclosure, as shown in Fig. 4, the method includes:
    • step 401, a portal client requests to join a portal server.
  • The portal server that the portal client requests to join is a portal server pre-configured to perform network access authentication of the portal client.
    the portal client transmits a REQ_JOIN message to the portal server to request to join the portal server, wherein the message carries information regarding a portal protocol version and function required by the portal client.
  • Step 402, the portal server returns a matching result to the portal client.
  • The portal server determines, according to received information regarding a portal protocol version and function required by the portal client carried in the REQ_JOIN message, whether the portal server matches the portal client, if yes, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 0 to return matching success information; otherwise, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 1 to return non-matching information, and saves a portal protocol version and function required by a non-matching portal client.
  • The above steps 401 and 402 are a processing process of establishing an instance connection between the portal client and the portal server through capability negotiation.
  • Step 403, the portal client labels a valid instance between the portal client and the portal server having the instance connection therebetween.
  • The portal client records the currently established instance connection by labeling a valid instance, the processing of steps 401 to 403 can be exemplified as below: a portal client B requests to join a portal server A1 and a portal server A2, in step 402 the portal server A1 returns matching success information and the portal server A2 returns non-matching information, then the portal client B sets a valid instance <portal client B, portal server A1>.
  • Step 404, when the portal server upgrades its portal protocol and/or function, the portal server forcibly separates from management of a matching portal client.
  • The portal server requests to forcibly separate from the management of the portal client through transmitting a FORCE_LEAVE to the matching portal client so as to disconnect the instance connection with the portal client.
  • Step 405, the portal client acknowledges that the portal server has separated from its management.
  • When receiving the FORCE_LEAVE message, the portal client cancels setting a valid instance including the portal server transmitting the FORCE_LEAVE message, and returns an ACK_FORCE_LEAVE message to the portal server to announce that the portal server has separated from its management.
  • The processing of steps 401 to 403 is exemplified as below: when upgrading its portal protocol and/or function, a portal server A1 transmits a FORCE_LEAVE message to its matching portal client B, the portal client B cancels its set valid instance <portal client B, portal server A1>, and returns an ACK_FORCE_LEAVE message to the portal server A1 to announce that the portal server A1 has separated from its management.
  • Step 406, the portal client requests to join a portal server upgrading its portal protocol and/or function.
  • The portal client periodically transmits a REQ_JOIN message to the portal server that have separated from its management to request to re-join.
  • Step 407, the portal server after completing its portal protocol and/or function upgrading returns matching result information to a portal client requesting to join.
  • The portal server determines after upgrading its portal protocol and/or function whether the updated portal protocol and/or function match a portal protocol and function required by the portal client requesting to join, if yes, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 0 to return matching success information, and proceed to step 408; otherwise, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 1 to return non-matching information, stores a portal protocol version and function required by a non-matching portal client, and ends the processing.
  • The above steps 406 and 407 are a processing process of performing capability negotiation by the portal client and the portal server having their instance connection disconnected.
  • Step 408, the portal client labels a valid instance of the portal client and the portal server having the instance connection therebetween.
  • The processing of steps 406 to 408 can be exemplified as below: when a portal client B requests to re-join a portal server A1 that has forcibly separated from its management in step405, if the portal server A1 returns matching success information to the portal client B, it represents that the portal server A1 and the portal client B establish an instance connection through capability negotiation, and then the portal client B sets a valid instance <portal client B, portal server A1>.
  • Step 409, the portal server after the portal protocol and/or function upgrading announces matching information to its matching portal client.
  • When the portal server determines, according to a portal protocol version and function required by the non-matching portal client before the upgrading and stored in step 402, determines that the portal server after the upgrading matches a portal server that doesn't match it before the upgrading, the portal server transmits an INFO_NOTIFY message to the portal client to announce that the portal server matches the portal client, and when the portal client receives the INFO_NOTIFY message and determines that the portal server matches the portal client, the portal client performs capability negotiation to establish an instance connection, and the specific processing process is the same as steps 401 to 403.
  • In a preferred embodiment of the disclosure, when upgrading its portal protocol, a portal client requests to separate from management of a portal server matching the portal client to disconnect an instance connection, and performs capability negotiation after the upgrading; when an IP address of the portal client and an IP address pool locally configured at the portal client changes, a portal server matching the portal client updates, according to an announcement from the portal client, a saved IP address of the portal client and saved IP address pool locally configured at the portal client.
  • Fig. 5 is a flow chart of a device management method according to an embodiment of the disclosure, as shown in Fig. 5, the method includes:
    • step 501, when upgrading its portal protocol, a portal client requests to separate from management of a portal server matching the portal client.
  • When upgrading its portal protocol, the portal client cancels a set valid instance, transmits an ASK_LEAVE message to a portal server included in the canceled valid instance, and requests for separation from the management of the portal server so as to disconnect an instance connection with the portal client.
  • Step 502, the portal server matching the portal client acknowledges that the portal client has separated from its management.
  • When receiving the ASK_LEAVE message, the portal server labels the portal client as a non-matching portal client, and transmits an ACK_LEAVE message to the portal client to announce that the portal client has separated from its management.
  • step 503, a portal client after the portal protocol upgrading requests to join a portal server.
  • The portal server that the portal client requests to join is a portal server pre-configured to perform network access authentication of the portal client.
    the portal client transmits a REQ_JOIN message to the portal server, wherein the message carries information regarding a portal protocol version and function required by the portal client.
  • Step 504, the portal server returns a matching result to the portal client after the upgrading that requests to join.
  • The portal server determines, according to received information regarding a required portal protocol version and function carried in the REQ_JOIN message, whether the portal server matches the portal client, if yes, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 0 to return matching success information; otherwise, the portal server transmits, to the portal client, an ACK_JOIN message with its ErrCode field being 1 to return non-matching information, and saves a portal protocol version and function required by a non-matching portal client.
  • The above steps 503 and 504 are a processing process of performing capability negotiation by the portal client and the portal server having their instance connection disconnected.
  • Step 505, the portal client after the upgrading sets a valid instance between the portal client and the portal server having the instance connection therebetween.
  • The portal client records the currently established instance connection by labeling a valid instance, when the portal client after the upgrading receives an ACK_JOIN message with its ErrCode field being 0 returned by the portal server, it represents that the portal server returning the ACK_JOIN message matches the portal client after the upgrading, and then the portal client after the upgrading sets a valid instance of the portal server including the portal client and returning the CK_JOIN message.
  • For example, a portal client B after the upgrading requests to join a portal server A1 and a portal server A2, if the portal server A1 returns an ACK_JOIN message with its ErrCode field being 0, it represents that the portal server A1 and the portal client B establish an instance connection through capability negotiation, and then the portal client B sets a valid instance <portal client B, portal server A1>.
  • Step 506, when an IP address of the portal client and/or an IP address pool locally configured at the portal client, the portal client announces the changed IP address of the portal client and/or the changed IP address pool locally configured at the portal client to the portal server having the instance connection established with the portal client.
  • The changed IP address of the portal client and/or the changed IP address pool locally configured at the portal client are carried in an INFO_NOTIFY message.
  • Step 507, the portal server acknowledges that the IP address of the portal client and the IP address pool locally configured at the portal client have been updated.
  • The portal server receives the IP address of the portal client and/or the IP address pool locally configured at the portal client, which are carried in the INFO_NOTIFY message, updates its stored IP address of the portal client and/or IP address pool locally configured at the portal client, and returns an ACK_INFO_NOTIFY to acknowledge that the IP address and IP address pool have been updated.
  • What described are merely preferable embodiments of the disclosure, and are not intended to limit the disclosure.

Claims (22)

  1. A portal device management method, comprising:
    establishing an instance connection between a portal client and a pre-configured portal server through capability negotiation; and
    announcing, by each of the portal client and the pre-configured portal server having the instance connection established therebetween, its information to its opposite end.
  2. The method according to claim 1, wherein the establishing an instance connection between a portal client and a pre-configured portal server through capability negotiation comprises:
    establishing the instance connection between the portal client and the pre-configured portal server when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  3. The method according to claim 1, further comprising:
    determining the pre-configured portal server having the instance connection established with the portal client as a portal server that performs mandatory authentication of a user client supported by the portal client.
  4. The method according to claim 1, further comprising: after the establishing an instance connection between a portal client and a pre-configured portal server through capability negotiation,
    disconnecting the instance connection between the portal client and the pre-configured portal server when the portal client upgrades its portal protocol, and re-establishing the instance connection between the portal client and the pre-configured portal server when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  5. The method according to claim 1, further comprising: after the establishing an instance connection between a portal client and a pre-configured portal server through capability negotiation,
    disconnecting the instance connection between the portal client and the pre-configured portal server when the pre-configured portal server having the instance connection established with the portal client upgrades its portal protocol and/or function, and re-establishing the instance connection between the portal client and the pre-configured portal server when the portal client and the pre-configured portal server determine through capability negotiation that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server after the upgrading.
  6. The method according to claim 1, wherein the announcing, by each of the portal client and the pre-configured portal server having the instance connection established therebetween, its information to its opposite end comprises:
    announcing, by the pre-configured portal server, its load information to the portal client having the instance connection established with the pre-configured portal server; and wherein the method further comprises: updating, by the portal client, the instance connection between the portal client and the pre-configured portal server according to the load information.
  7. The method according to claim 1, wherein the announcing, by each of the portal client and the pre-configured portal server having the instance connection established therebetween, its information to its opposite end comprises:
    announcing, by the portal client, to the pre-configured portal server having the instance connection with the portal client, an IP address of a user client supported by the portal client or an IP address pool locally configured at the portal client, and when the IP address of the user client supported by the portal client or the IP address pool locally configured at the portal client changes, announcing the changed IP address and/or changed IP address pool to the pre-configured portal server having the instance connection with the portal client; and
    announcing, by the pre-configured portal server, a Uniform Resource Locator (URL) of its authentication page to the portal client having the instance connection established with the pre-configured portal server, and when the URL of the authentication page changes, announcing the changed URL to the portal client having the instance connection established with the pre-configured portal server.
  8. The method according to any one of claims 1 to 7, wherein the announcing, by each of the portal client and the pre-configured portal server having the instance connection established therebetween, its information to its opposite end comprises:
    announcing, by the pre-configured portal server, a public key of an asymmetric encryption algorithm to the portal client having the instance connection established with the pre-configured portal server.
  9. A portal client comprising a first negotiation and connection module and a first announcement module,
    wherein the first negotiation and connection module is configured to establish an instance connection with a pre-configured portal server through capability negotiation; and
    wherein the first announcement module is configured to announce information of the portal client to the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  10. The portal client according to claim 9, wherein
    the first negotiation and connection module is further configured to establish the instance connection with the pre-configured portal server when determining through capability negotiation with the pre-configured portal server that a portal protocol version and function required by the portal client match a portal version and function supported by the pre-configured portal server.
  11. The portal client according to claim 9, further comprising:
    a determination module configured to determine the pre-configured portal server having the instance connection established with the first negotiation and connection module as a portal server that performs mandatory authentication of a user client supported by the portal client.
  12. The portal client according to claim 9, wherein
    the first negotiation and connection module is further configured to disconnect the instance connection with the pre-configured portal server when the portal client upgrades its portal protocol, and re-establish the instance connection with the pre-configured portal server when determining through capability negotiation with the pre-configured portal server that a portal protocol version and function required by the portal client after the upgrading match a portal version and function supported by the pre-configured portal server.
  13. The portal client according to claim 9, wherein
    the first negotiation and connection module is further configured to update the instance connection with the pre-configured portal server according to load information announced by the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  14. The portal client according to any one of claims 9 to 13, wherein
    the first announcement module is configured to announce an IP address of the portal client and an IP address pool locally configured at the portal client to the pre-configured portal server having the instance connection established with the first negotiation and connection module, and when the IP address of the portal client and/or the IP address pool locally configured at the portal client change(s), announce the changed IP address and/or changed IP address pool to the pre-configured portal server having the instance connection established with the first negotiation and connection module.
  15. A portal server comprising a second negotiation and connection module and a second announcement module,
    wherein the second negotiation and connection module is configured to establish an instance connection with a portal client through capability negotiation; and
    wherein the second announcement module is configured to announce information of the portal server to the portal client having the instance connection established with the second negotiation and connection module.
  16. The portal server according to claim 15, wherein
    the second negotiation and connection module is further configured to establish the instance connection with the portal client when determining through capability negotiation with the portal client that a portal protocol version and function required by the portal client match a portal version and function supported by the portal server.
  17. The portal server according to claim 15, wherein
    the second negotiation and connection module is further configured to disconnect the instance connection with the portal client when the portal server upgrades its portal protocol and/or function, and re-establish the instance connection with the portal client when determining through capability negotiation with the portal client that a portal protocol version and function required by the portal client match a portal version and function supported by the portal server after the upgrading.
  18. The portal server according to claim 15, wherein
    the second announcement module is configured to announce load information of the portal server to the portal client having the instance connection established with the portal server.
  19. The portal server according to claim 15, wherein
    the second announcement module is further configured to announce a Uniform Resource Locator (URL) of an authentication page of the portal server to the portal client having the instance connection established with the portal server, and when the URL of the authentication page changes, announce the changed URL to the portal client having the instance connection established with the portal server.
  20. The portal server according to any one of claims 15 to 19, wherein
    the second announcement module is further configured to announce a public key of an asymmetric encryption algorithm to the portal client having the instance connection established with the portal server.
  21. A portal system comprising a pre-configured portal client and a portal server,
    wherein the pre-configured portal server is configured to establish an instance connection with the portal client through capability negotiation, and announce its information to the portal client having the instance connection established with the pre-configured portal server; and
    wherein the portal client is configured to establish the instance connection with the pre-configured portal server through capability negotiation, and announce its information to the pre-configured portal server having the instance connection established with the portal client.
  22. The portal system according to claim 21, wherein the portal client is a portal client according to any one of claims 9 to 14, and the pre-configured portal server is a portal server according to any one of claims 15 to 20.
EP13880563.5A 2013-03-29 2013-09-16 Method for managing portal device, and portal device and system Active EP2981043B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310110126.XA CN103220345B (en) 2013-03-29 2013-03-29 Door device management method and door equipment and system
PCT/CN2013/083593 WO2014153930A1 (en) 2013-03-29 2013-09-16 Method for managing portal device, and portal device and system

Publications (3)

Publication Number Publication Date
EP2981043A1 true EP2981043A1 (en) 2016-02-03
EP2981043A4 EP2981043A4 (en) 2016-07-06
EP2981043B1 EP2981043B1 (en) 2018-07-04

Family

ID=48817796

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13880563.5A Active EP2981043B1 (en) 2013-03-29 2013-09-16 Method for managing portal device, and portal device and system

Country Status (4)

Country Link
US (1) US20160057232A1 (en)
EP (1) EP2981043B1 (en)
CN (1) CN103220345B (en)
WO (1) WO2014153930A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220345B (en) * 2013-03-29 2016-12-28 中兴通讯股份有限公司 Door device management method and door equipment and system
CN105873058B (en) * 2016-06-08 2020-05-15 深圳市梧桐世界科技股份有限公司 Local portal caching method
CN107979577B (en) 2016-10-25 2021-10-15 华为技术有限公司 Terminal authentication method and device
CN109005143B (en) * 2017-06-07 2022-03-04 上海中兴软件有限责任公司 Method and device for adjusting website load
CN110995706B (en) * 2019-12-03 2021-09-21 广州市百果园信息技术有限公司 Authentication system, method, device and storage medium for communication application

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7908337B2 (en) * 2000-04-28 2011-03-15 Adara Networks, Inc. System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content
EP1421736B1 (en) * 2001-08-29 2005-06-01 Telefonaktiebolaget LM Ericsson (publ) Method and device for multicasting in a umts network
US20060282545A1 (en) * 2005-06-11 2006-12-14 Arwe John E Method and apparatus for application or protocol version negotiation
CN1859403B (en) * 2006-02-09 2010-05-12 华为技术有限公司 Method for ability consulting in customer end/server mode service system
US20070211752A1 (en) * 2006-03-13 2007-09-13 Utstarcom, Incorporated Method of establishing a PPP session over an air interface
US7701970B2 (en) * 2007-04-10 2010-04-20 International Business Machines Corporation Protocol negotiation for a group communication system
US20100274893A1 (en) * 2009-04-27 2010-10-28 Sonus Networks, Inc. Methods and apparatus for detecting and limiting focused server overload in a network
EP2504950B1 (en) * 2009-11-24 2017-09-20 Orange Access control for a service subscription
US9407539B1 (en) * 2011-06-24 2016-08-02 Amazon Technologies, Inc. Techniques for utilizing network destination identifiers simultaneously announced from multiple locations
CN102624707B (en) * 2012-02-22 2018-04-17 中兴通讯股份有限公司 A kind of method and system of negotiation IPv6 information
US9300766B2 (en) * 2012-07-31 2016-03-29 At&T Intellectual Property I, L.P. Method and apparatus for initiating and maintaining sessions between endpoints
US9075953B2 (en) * 2012-07-31 2015-07-07 At&T Intellectual Property I, L.P. Method and apparatus for providing notification of detected error conditions in a network
CN103220345B (en) * 2013-03-29 2016-12-28 中兴通讯股份有限公司 Door device management method and door equipment and system

Also Published As

Publication number Publication date
WO2014153930A1 (en) 2014-10-02
EP2981043B1 (en) 2018-07-04
US20160057232A1 (en) 2016-02-25
CN103220345A (en) 2013-07-24
EP2981043A4 (en) 2016-07-06
CN103220345B (en) 2016-12-28

Similar Documents

Publication Publication Date Title
EP2326047B1 (en) Method and system for terminal configuration and management
US8325625B2 (en) Method and system for automatic data transfer on a network-connected device
EP2981043B1 (en) Method for managing portal device, and portal device and system
US20130125228A1 (en) Timestamp-based token revocation
US20150358272A1 (en) Method and apparatus for message transmission
US20110060830A1 (en) Method, system and device for device capabilities exchange
CN111787517A (en) Method and device for binding activation of intelligent equipment
US10367891B2 (en) System and method for improving efficiency of SSL/TLS connections
WO2014166210A1 (en) Client, server, and remote authentication dial in user service capability negotiation method and system
US9417887B2 (en) Method and apparatus for bootstrapping gateway in device management system
JP6548445B2 (en) Communication device, communication method and program
WO2024002143A1 (en) Root certificate updating method and apparatus
WO2013189398A2 (en) Application data push method, device, and system
US20230413120A1 (en) Methods and systems for communication session management
EP2592807A1 (en) Timestamp-Based Token Revocation
US7774464B2 (en) Automatic syncML client profile creation for new servers
WO2014035783A1 (en) Systems and methods for efficient remote security panel configuration and management
CN114124891A (en) Network request processing method and device, storage medium and electronic device
CN113542324A (en) Message pushing method and device
CN114363204A (en) Request monitoring method, network device and storage medium
CN106375224B (en) Router and method for network connection by using same
EP2720432B1 (en) Mobile Network Session Protocol for Mobile Communication
CN1957347A (en) Method and system for automatic data transfer on a network-connected device
KR20160084142A (en) Method and server for setting representative number
KR20120070369A (en) System and method for authentication in wireless lan

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20151001

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 12/24 20060101ALI20160226BHEP

Ipc: H04L 29/06 20060101ALI20160226BHEP

Ipc: H04L 29/08 20060101AFI20160226BHEP

A4 Supplementary search report drawn up and despatched

Effective date: 20160602

DAX Request for extension of the european patent (deleted)
RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 12/24 20060101ALI20160527BHEP

Ipc: H04L 29/06 20060101ALI20160527BHEP

Ipc: H04L 29/08 20060101AFI20160527BHEP

17Q First examination report despatched

Effective date: 20171025

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20180216

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: CH

Ref legal event code: NV

Representative=s name: MICHELI AND CIE SA, CH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1015717

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180715

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602013039916

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180704

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1015717

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180704

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181005

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181004

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181004

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181104

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602013039916

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

26N No opposition filed

Effective date: 20190405

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20180930

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180916

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180916

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180916

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180704

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20130916

Ref country code: MK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180704

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602013039916

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029080000

Ipc: H04L0065000000

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230727

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230710

Year of fee payment: 11

Ref country code: DE

Payment date: 20230726

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20231001

Year of fee payment: 11